Computer crime.pdfVIP

  • 36
  • 0
  • 约 9页
  • 2015-10-01 发布于河南
  • 举报
Computer crime.pdf

Computers Security Vol.20, No.8, pp.715-723, 2001 Copyright © 2001 Elsevier Science Limited Printed in Great Britain. All rights reserved 0167-4048/01$20.00 Computer crimes: theorizing about the enemy within Gurpreet Dhillon and Steve Moores College of Business, Box 456009, University of Nevada, Las Vegas, NV, 89154-6009, USA Tel: (702) 895 3676; Fax: (702) 895 4370, Email: dhillon@ Abstract of personal factors, work situations and available opportunities.These insiders may be dishonest or dis- A majority of computer crimes occur because a cur- gruntled employees who would copy, steal, or sabotage rent employee of an organization has subverted exist- information, yet their actions may remain undetected. ing controls. By considering two case studies, this Such illegal and often malicious acts can have serious paper analyzes computer crimes resulting because of consequences for a business, yet many companies do violations of safeguards by employees.The paper sug- not follow the proper procedures so as to prevent ille- gests that various technical, procedural and normative gal activities from taking place.This includes having a controls should be put in place to prevent illegal and system of controls in place to help prevent an employ- malicious acts from taking place. Ult

文档评论(0)

1亿VIP精品文档

相关文档